by Ron Samson Jr | | Network Security, Threat Insight
The Insider Threat: How To Mitigate The Top Three Human Risks To Your Company’s Information Systems. We lock our systems and networks down, we install the latest and greatest Intrusion Detection/Prevention Systems (IDS/ IPS), and we have the best physical security at...
by Ron Samson Jr | | Network Security, Threat Insight
Why do I need a Vulnerability Assessment and Remediation Plan? Look, we know what you’re thinking: “We have never been hacked to my knowledge, why would I need a cybersecurity assessment and remediation program, or plan?” To keep your business safe, and in line with...
by Ron Samson Jr | | Threat Insight
What is spear phishing? Spear phishing is a targeted attack delivered via email – commonly using some piece of information like the recipients name, their bank, a company they work with etc. People are much more likely to fall for these type of attacks than...
by Ron Samson Jr | | Threat Insight
What is a malicious attachment? Malicious attachments typically come along with phishing emails. They may come in the form of a fake invoice, or word doc and contain threats like ransomware, malware, keyloggers and other threats. How do I identify a malicious email...
by Ron Samson Jr | | Threat Insight
What is a malicious URL? A malicious URL is one that was created with the intent to distribute malware like ransomware. They are often contained within spam, phishing, and spearphishing emails. Often times they are disguised by URL shorteners such as Bit.ly or a...
by Ron Samson Jr | | Threat Insight
What is phishing? Phishing is a scam where psychological manipulation is used to scare or trick victims into giving away sensitive data like passwords or paying money through the use of fraudulent invoices. What types of phishing are there? Spear phishing –...